The ECSA class is security penetration testing by experts for experts. Certification and Process in 5 days.

The ECSA and LPT class is "how to test" and "how to report" to management network vulnerabilities. The ECSA class presented together with the LPT allows your team to spend 1 week and gain the tactical security skills to be a qualified License Penetration Tester.

We use highly qualified SME instructors that know hacking and pen testing. This tactical ECSA class has MORE LABS focused on advanced vulnerability assessments, penetration testing, reporting and the knowledge to pass the ECSA test. You will gain the mind set used by both security testers and hackers alike.
In 5 days, you will pass your ECSA exam and be prepared to write detailed and executive reports for management.

Each day you will spend 3 hrs in labs practicing how to gain access to unauthorized information with current exploitation tools and processes. Learn the tactical business skills necessary to perform valid security testing regardless of the architecture of the target network. Call for more details today! Customize your ECSA & LPT training program

You'll run 3 hours of hacking attacks every night in addition to ECSA hands on labs. Perform every stage of an actual security assessment/penetration test in a target rich, controlled classroom environment.
Penetration concepts you will master during this hands on class...

Attacking network infrastructure devices

Hacking by brute forcing remotely

Security testing methodologies

Security exploit testing with IMPACT from Core Security

Stealthy network recon

Remote root vulnerability exploitation

Multi-OS banner grabbing

Privilege escalation hacking

Unauthorized data extraction

Breaking IP-based ACLs via spoofing

Evidence removal and anti-forensics

Hacking Web Applications

Breaking into databases with SQL Injection

Cross Site Scripting hacking

Remote access trojan hacking

Offensive sniffing

Justifying a penetration test to management and customers

Defensive techniques

Instructor-led hands-on lab exercises

Capture the Flag hacking exercises

Abusing DNS for host identification

Leaking system information from Unix and Windows

Stealthy Recon

Unix, Windows and Cisco password cracking

Remote buffer overflow exploit lab I - Stack mashing

Remote heap overflow exploit lab - Beyond the Stack

Desktop exploitation

Remote keylogging

Data mining authentication information from clear-text protocols

Remote sniffing

Malicious event log editing

Transferring files through firewalls

Hacking into Cisco routers

Harvesting web application data

Data retrieval with SQL Injection Hacking

Phase I  Gather the DataA first look at a network site, from the eyes of a potential hacker. The simple, and often overlooked, things that tell hackers if a site is worth a penetration attempt.